📄 2219.txt
字号:
Rule: --Sid:2219--Summary:This event is generated when an attempt is made to access setpasswd.cgi on an internal web server. This may indicate an attempt to exploit an authentication vulnerability in Trend Micro Interscan VirusWall 3.0.1 and 3.6.x.--Impact:Information disclosure, VirusWall administrative access.--Detailed Information:Trend Micro Interscan VirusWall contains an authentication vulnerability in versions 3.6.x and lower. When an administrative user changes their VirusWall account password using setpasswd.cgi, the username and password are transmitted in clear text. If an attacker is monitoring network traffic, he/she can obtain the username and password for VirusWall administration.--Affected Systems:Systems running Trend Micro Interscan VirusWall 3.0.1 or 3.6.x.--Attack Scenarios:An attacker is monitoring network traffic and intercepts the HTTP message that contains the VirusWall administrator's username and password. The attacker can then use this information to log into VirusWall and make changes to system configuration that may leave the network more open to compromise. --Ease of Attack:Simple.--False Positives:If a legitimate remote user accesses setpasswd.cgi, this rule may generate an event.--False Negatives:None known.--Corrective Action:Upgrade to a newer version of Trend Micro VirusWall. Otherwise, do not use web-based configuration tools.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>Sourcefire Technical Publications TeamJennifer Harvey <jennifer.harvey@sourcefire.com>-- Additional References:Bugtraqhttp://www.securityfocus.com/bid/2212--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -